oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 24 )

2018 ( 262 )

2017 ( 337 )

2016 ( 275 )

Custom range...

Search Results: 1 - 10 of 18216 matches for " Chengchi Fang "
All listed articles are free for downloading (OA Articles)
Page 1 /18216
Display every page Item
Negative Feedback Regulation of Wnt4 Signaling by EAF1 and EAF2/U19
Xiaoyang Wan,Wei Ji,Xue Mei,Jiangang Zhou,Jing-xia Liu,Chengchi Fang,Wuhan Xiao
PLOS ONE , 2012, DOI: 10.1371/journal.pone.0009118
Abstract: Previous studies indicated that EAF (ELL-associated factor) family members, EAF1 and EAF2/U19, play a role in cancer and embryogenesis. For example, EAF2/U19 may serve as a tumor suppressor in prostate cancer. At the same time, EAF2/U19 is a downstream factor in the non-canonical Wnt 4 signaling pathway required for eye development in Xenopus laevis, and along with EAF1, contributes to convergence and extension movements in zebrafish embryos through Wnt maintenance. Here, we used zebrafish embryos and mammalian cells to show that both EAF1 and EAF2/U19 were up-regulated by Wnt4 (Wnt4a). Furthermore, we found that EAF1 and EAF2/U19 suppressed Wnt4 expression by directly binding to the Wnt4 promoter as seen in chromatin immunoprecipitation assays. These findings indicate that an auto-regulatory negative feedback loop occurs between Wnt4 and the EAF family, which is conserved between zebrafish and mammalian. The rescue experiments in zebrafish embryos showed that early embryonic development required the maintenance of the appropriate levels of Wnt4a through the feedback loop. Others have demonstrated that the tumor suppressors p63, p73 and WT1 positively regulate Wnt4 expression while p21 has the opposite effect, suggesting that maintenance of appropriate Wnt4 expression may also be critical for adult tissue homeostasis and prevention against tumor initiation. Thus, the auto-regulatory negative feedback loop that controls expression of Wnt4 and EAF proteins may play an important role in both embryonic development and tumor suppression. Our findings provide the first convincing line of evidence that EAF and Wnt4 form an auto-regulatory negative feedback loop in vivo.
A Study on the Risk of Small and Medium Enterprises Financial Outsourcing in China  [PDF]
Fang Fang
Open Journal of Social Sciences (JSS) , 2016, DOI: 10.4236/jss.2016.410001
Abstract: The domestic enterprises began to face fiercer competition, which under the rapid development in the global economy today and the market increasingly competitive. During the government work report of 2015, Prime Minister Li Keqiang first proposed that encouraging people to start their own business and to make innovations, so that can be a new engine of economic development under the China’s New Normal. The leader of the economic reform is the micro, small and medium enterprises. In addition to the support of policy from the government for SMEs in financing, the SMEs should try to reduce the cost of capital by business management. The SMEs also need to create unique core competitiveness, in order to gain a foothold in the ever-changing global market. Outsourcing as one of the important means to reduce operating costs, has been adopted by more and more enterprises. As an auxiliary function of enterprise, financial outsourcing is beneficial to reduce the management cost and improve the efficiency of management. It can also help SMEs focus on the core competitiveness of ascension. When SMEs enjoy the benefits of such financial outsourcing, they are also associated with the risk of outsourcing. If the enterprise does not have a clear understanding and effective management with the outsourcing risk, it will lead to the enterprise cannot reach the purpose of outsourcing, also called the failure of outsourcing activities. Therefore, while the SMEs choose financial outsourcing, they must have the analysis and evaluation system of outsourcing risk. In this paper, based on the above analysis of the background, we study the risk of SMEs financial outsourcing. And after introducing the content and the status quo of financial outsourcing, we discuss the financial risk when the enterprise using financial outsourcing, and classify the risk, then measure the risk response, which in order to offer the decision-making basis for the successful implementation of financial outsourcing activities.
A Study of Financial Risks of Listed Manufacturing Companies in China  [PDF]
Fang Fang
Journal of Financial Risk Management (JFRM) , 2016, DOI: 10.4236/jfrm.2016.54022
Abstract:
Financial risk is an objective phenomenon in economic activities. It has received extensive attention in theoretical and practical fields. For each company and operators in the market economy, the financial risk is an objective existence. The manufacturing industry as a pillar industry of China’s economic development, occupies a large proportion in China’s listed company. However because of the characteristics of its own manufacturing and the increasingly fierce market competition, some manufacturing listed companies went to bankruptcy because of financial risk crisis, so the research on manufacturing listed company financial risk has a very far-reaching significance. With the development of society, the financial risk is becoming more and more complex. This theory will combine research results and empirical analysis, define the concept of financial risk in manufacturing enterprises, use listed Chinese manufacturing companies as the research object, to analyze the cause of financial risk on the basis of reasoning analysis. This article aims to put forward measures to deal with financial risks, according to the Chinese manufacturing industry development situation, using both internal price control mechanism construction and financial risk management mechanism to protect the interests of stakeholders.
Application of a Dynamic Identity Authentication Model Based on an Improved Keystroke Rhythm Algorithm  [PDF]
Wenchuan YANG, Fang FANG
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2009, DOI: 10.4236/ijcns.2009.28082
Abstract: Keystroke rhythm identification, which extracts biometric characteristics through keyboards without addi-tional expensive devices, is a kind of biometric identification technology. The paper proposes a dynamic identity authentication model based on the improved keystroke rhythm algorithm in Rick Joyce model and implement this model in a mobile phone system. The experimental results show that comparing with the original model, the false alarm rate (FAR) of the improved model decreases a lot in the mobile phone system, and its growth of imposter pass rate (IPR) is slower than the Rick Joyce model’s. The improved model is more suitable for small memory systems, and it has better performance in security and dynamic adaptation. This improved model has good application value.
Warrant Price Range Adjustment Based on Investor Sentiment  [PDF]
Xianming Fang
Journal of Service Science and Management (JSSM) , 2010, DOI: 10.4236/jssm.2010.34055
Abstract: The warrant price fluctuated in a range based on the arbitrage-free hypothesis. However, in the actual transaction, the warrant price will deviate the price range because of the investor sentiment, sometimes the deviation is too far that the actual price breaks the lower limit based on the arbitrage-free hypothesis, which make the market some arbitrage opportunities. The buyers’ strength and the sellers’ strength are the concentrated expression of the investor sentiment. According to the buyers’ strength and the sellers’ strength, a warrant price modification factor has been built with investor sentiment by function transformation. The new function adjusts the theoretical price range and identifies the arbitrage opportunities of the warrant market. The empirical test on Baotou Steel warrants shows that, after the adjustment, only a few the actual price deviates from the adjustment price range and the correction is better. So, when the warrant price trend is analyzed, the impact of the investor sentiment should be taken into account.
On Over-Relaxed Proximal Point Algorithms for Generalized Nonlinear Operator Equation with (A,η,m)-Monotonicity Framework  [PDF]
Fang Li
International Journal of Modern Nonlinear Theory and Application (IJMNTA) , 2012, DOI: 10.4236/ijmnta.2012.13009
Abstract: In this paper, a new class of over-relaxed proximal point algorithms for solving nonlinear operator equations with (A,η,m)-monotonicity framework in Hilbert spaces is introduced and studied. Further, by using the generalized resolvent operator technique associated with the (A,η,m)-monotone operators, the approximation solvability of the operator equation problems and the convergence of iterative sequences generated by the algorithm are discussed. Our results improve and generalize the corresponding results in the literature.
Ben-Naim’s “Pitfall”: Don Quixote’s Windmill  [PDF]
Yi Fang
Open Journal of Biophysics (OJBIPHY) , 2013, DOI: 10.4236/ojbiphy.2013.31002
Abstract:

Ben-Naim in three articles dismissed and answered the Levinthals paradox. He announces there are pitfalls caused by the misinterpretation of thermodynamic hypothesis. He claims no existence of Gibbs free energy formula where the variable is a protein’s conformation X . His Gibbs energy functional is G(T, P, N, P(R)), where the variable is probability distributions P (R) of the conformations. His “minimum distribution Peq is wrong. By carefully establishing thermodynamic systems, we demonstrate how to apply quantum statistics to derive Gibbs free energy formula G(X). The formula of the folding force \"\" is given.

Conceptual Metaphor and Vocabulary Teaching in the EFL Context  [PDF]
Xin Fang
Open Journal of Modern Linguistics (OJML) , 2014, DOI: 10.4236/ojml.2014.42030
Abstract: Metaphor, as a matter of thought, a way of cognition, is pervasive in our everyday life and language. As human beings’ important cognitive way, metaphor also serves as one of the important ways for language to develop, including vocabulary. Traditionally, most students memorize vocabulary mechanically with unpleasant results. They don’t realize most words come from metaphorical way, and metaphor is an important process of word meanings expanding and evolution. This paper will give a brief discussion about conceptual metaphor theory and analyze how to apply this theory into vocabulary teaching in the EFL context, in order to help learners to learn vocabulary thoroughly, systematically, and efficiently.
Empirical Study on Overreaction and Underreaction in Chinese Stock Market Based on ANAR-TGARCH Model  [PDF]
Yong Fang
Journal of Financial Risk Management (JFRM) , 2013, DOI: 10.4236/jfrm.2013.24012
Abstract: An ANAR-TGARCH model is adopted in this paper. By using a first-order asymmetric autoregressive mean equation, we conduct a series of robust tests on overreaction and underreaction in the Chinese stock market by taking the abnormal value, run length, time scale, size, industry, style, and market cycle into account. We then comprehensively compare the intensities of the first-order autocorrelation by using Wald coefficients tests. Results could provide strong empirical support for generating stock market investment strategies.
Discussion of Function of Church and State in Public Education in the U.S.  [PDF]
Fang Wang
Open Journal of Social Sciences (JSS) , 2014, DOI: 10.4236/jss.2014.29047
Abstract: Religion in relation to public education has been a topic of keen interest in the U.S. It has two components: one deals with the theme of religious content in the curriculum and the other concerns fringe benefits to nonpublic schools. And, where the State stands, the decisions and measures made by the U.S. Supreme Court concern religious matters in public schools.
Page 1 /18216
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.